Skip to main content

Home/ Globaltech/ Group items tagged research

Rss Feed Group items tagged

anonymous

Blogs Wane as the Young Drift to Sites Like Twitter - NYTimes.com - 7 views

  •  
    Go to each link in the article and describe it. march 3 Nat
  •  
    Facebook : It is the world's largest social network site, which was founded in 2004 by Mark Zuckerberg. It has become a very developed source on the internet, where users can like, share, comment on something without leaving the web page that they were at. There are approximately 500 million users worldwide. Twitter : Twitter is a social networking site that was started up by a group of 10 people called Obvious, and it has become popular for its simplicity of "micro-blogging" where a twitterer or tweeter sends short messages called tweets, within 140 characters, and are shared with people that follow you, and to the public. Pew Research Center- It is a research center for the people and the press, and it is an independent, non-partisan public opinion research organization that studies attitudes toward politics, the press and public policy issues. Huffington post : Huffington post is a news website that began in 2005, and it has become the most heavily visited news web sites in the country. BlogHer : is a group blog, online community, and refers to an annual blogging conference for woman.  Lisa Stone, Elisa Camahort Page and Jory Des Jardins founded BlogHer in 2005 in response to the question, "Where are all the women bloggers?" Tumblr : Tumblr was founded in 2007 by David Krap, and it is a social networking site that allows user to post text, images, videos ,links, quotes and audio, which can be reblogged by other users who follow your blog. Google : Google was founded in 1998, and is known as the world's most popular internet search engine. Google hosts and develops a number of internet-based services and products,and generates profit primarily from advertising through its AdWords program, which has helped them earn huge profits for their company. LiveJournal : LiveJournal is a virtual community where Internet users can keep a blog, journal or a diary. LiveJournal is also the name of the free and open source server software that was desig
Dawoon Jung

Android's biggest security flaws | ZDNet - 1 views

  •  
    Android is widely accepted as being iOS' greatest rival, but, according to Dell SecureWorks security researcher Timothy Vidas, it has a host of issues that have made it a target for malware authors. Poor permissions: the huge host of permissions that users must understand are driving them into information paralysis; they are choosing to ignore the warnings presented to them, and not considering whether they may be dangerous or unnecessary. Open marketplace: Google Play does have an automated scanning program called Bouncer, but its effectiveness is as yet unknown. Therefore many Russian and Chinese alternative markets basically distribute 100 per cent malware Inexperienced or malicious developers: if they don't have any malicious intent, the developers could introduce new vulnerabilities into the target device, or create features that have unintended side effects.
anonymous

Bank app users warned over Android security | IT PRO - 4 views

  •  
    Mobile apps provided by mobile operators and handset manufacturers could put expose phone users to fraud, according to research that as many as 64 per cent of manufacturer added applications were exposing users to serious security issues.
  •  
    "Bank app users warned over Android security" Describe at least four types of vulnerabilities. Describe mobile point-of-sale devices. Explain why card fraud could endanger the payment chain.
anonymous

CQ Researcher Online - Entire Report - 2 views

  •  
    TOK presentation
anonymous

BBC News - Worm steals 45,000 Facebook passwords, researchers say - 8 views

  •  
    Explain the ways these networks are being hacked. How could you know if your facebook account had been hacked? all jan 17 jang
  •  
    Explain the ways these networks are being hacked. It is explained in the article that these networks are being hacked by using the stole credentials to log into the user's Facebook account. When the hackers logs into the Facebook account, it is used to transmit malicious links to other people such as friends. Friends would be a trustworthy person so the link would be visited. This would increase the speed of the malware's speed. Also, some users use the same password for many accounts which can be used by ill-intentioned people on the web. How could you know if your facebook account had been hacked? For you to know if your Facebook account had been hacked, users should run an anti-virus software to check and get rid of any malware that is hacking your account.
anonymous

IBM's Watson's ability to converse is a huge advance for AI research - Computerworld - 3 views

  •  
    Define: Artificial intelligence Turing test Why is a Jeopardy-playing computer considered such a huge advance in AI. Kuni Feb 22
  •  
    Define: Artificial intelligence- the branch of computer science that deal with writing computer programs that can solve problems creatively; "workers in AI hope to imitate or duplicate intelligence in computers and robots" Turing test- The Turing test is a proposal for a test of a machine's ability to demonstrate intelligence. It proceeds as follows: a human judge engages in a natural language conversation with one human and one machine, each of which tries to appear human. All participants are placed in isolated locations. Why is a Jeopardy-playing computer considered such a huge advance in AI? Because Jeopardy represents a next generation on AI that advancements in artificial intelligence and natural language processing that overcome the formidable challenge of conveying the same information in many different ways. The supercomputer owes that significance to its ability to deliver more than calculations and documents. This kind of ability makes this machine more equipped than any before it to systematize "thoughts" and converse.
anonymous

BBC - Newsbeat - HULC exoskeleton system ready for soldier tests - 16 views

  •  
    brief all sept 29 champ
  •  
    1. Identify the area of impact the scenario relates to. Business, government 2. Identify the main stakeholders to the IT system. US soldiers, US Department of Defense(Military), HULC project manager, Lokheed Martin, US Army's Natick Soldier Research Center 3. Indentify on ITGS social/ethical concern in the article. Reliability, People and machines 4. Describe ITGS terminology and systems. Robotic: The technology developed to combine software, mechanical manipulators, sensors, controllers and computers to provide programmable automation. The use of automated machines to replace human effort, although they may not perform. HULC (Human Universal Load Carrier) allows soldiers to carry weights of up to 200lbs (91kg) with little effort and is designed to reduce the strain of carrying heavy equipment which means soldiers can fight in the war very efficiently. Exoskeleton: outer layer that help covers, supports and protect the soldier body.
anonymous

Moods on Twitter Follow Biological Rhythms, Study Finds - NYTimes.com - 3 views

  • The new analysis suggests that our moods are driven in part by a shared underlying biological rhythm that transcends culture and environment.
  •  
    Who is reading our tweets? Interesting info. m12 october 10 jenny
  •  
    Who is reading our tweets? Sociologists at Cornell University, as well as research teams around the world are ready our tweets to see the change in biological patterns in the days of the week, as well as the hours of the day.
anonymous

Research and Innovative Technology Administration (RITA) - Intelligent Transportation S... - 1 views

  •  
    Jenny
anonymous

http://www.wired.com/gadgetlab/2009/07/sms-hijack-iphone/ - 1 views

  •  
    How can iphone be hijacked? How can a user tell if she is being SMS attacked? April 26 woo
  •  
    was i supposed to do this? it wasnt on the list so i didnt know...
  •  
    1. How can iphone be hijacked? The experts say that what you would know when your iphone is being hijacked is when one giveaway is if you receive a text message containing a single square character. If that happens, he suggests you immediately turn off your iPhone. The iPhone can be hijacked through a series of invisible SMS message bursts that hijacks the iPhone. The attacker would then be able to control all the functions on the iPhone, as well as continue to send messages to hijack more phones. 2. How can a user tell if she is being SMS attacked? The researchers said the hack involves sending a series of mostly invisible SMS bursts that effectively hijack an iPhone. From thereon, a hacker could control all the functions on the iPhone, such as e-mailing, dialing contacts - and, most alarmingly, sending more text messages to hijack even more iPhones. A user can tell if she is being SMS attacked if they receive a message containing a square character. Prevention measures include immediately turning off your iPhone.
anonymous

http://www.wired.com/gadgetlab/2011/04/apple-iphone-tracking/ - 2 views

  •  
    Why were the customers spooked? Why is this a problem? Describe consolidated.db. Check this link: tracking and recording your location data. How is apple collecting geodata? Why is apple collecting geodata? Explain the problems with collecting geodata. Could law enforcement in America be able to subpoena these types of records from people's iPhones or iPads? april 26 cream
  •  
    How can iphone be hijacked? The experts say that what you would know when your iphone is being hijacked is when one giveaway is if you receive a text message containing a single square character. If that happens, he suggests you immediately turn off your iPhone. How can a user tell if she is being SMS attacked? The researchers said the hack involves sending a series of mostly invisible SMS bursts that effectively hijack an iPhone. From thereon, a hacker could control all the functions on the iPhone, such as e-mailing, dialing contacts - and, most alarmingly, sending more text messages to hijack even more iPhones. Just turn off your iphone right away!
  •  
    Cream: Wrong Comment for this article. Comment again with the right answers. incomplete
1 - 13 of 13
Showing 20 items per page